General
-
Target
FloorDivision.luau
-
Size
101B
-
Sample
240521-ze5z7ahg4s
-
MD5
a86589afb1c3e7a84e089abcd70c836e
-
SHA1
5caeeea4474bac84f7490477491e3903968359a6
-
SHA256
4f46e7ff197b63e7c809f4def8722cb33a1244e48453e46af4fce77545e3ba04
-
SHA512
df8c67d030165b694f2a3bfc88d758f37752a0db4d91366c6d73dd5063ed61e45b96fdd478142cb37b32e78066ed17fbd35a046b2d2842b9a95988600d67edf5
Static task
static1
Behavioral task
behavioral1
Sample
FloorDivision.luau
Resource
win11-20240426-en
Malware Config
Extracted
https://rentry.org/lem61111111111/raw
Extracted
https://bitbucket.org/j46j746/hg56h56h56h/raw/7db2d3da302e81e3311c7814241af0d59152a170/lem.rar
Extracted
redline
45.15.156.142:33597
Targets
-
-
Target
FloorDivision.luau
-
Size
101B
-
MD5
a86589afb1c3e7a84e089abcd70c836e
-
SHA1
5caeeea4474bac84f7490477491e3903968359a6
-
SHA256
4f46e7ff197b63e7c809f4def8722cb33a1244e48453e46af4fce77545e3ba04
-
SHA512
df8c67d030165b694f2a3bfc88d758f37752a0db4d91366c6d73dd5063ed61e45b96fdd478142cb37b32e78066ed17fbd35a046b2d2842b9a95988600d67edf5
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1